Asus WL-160G User Manual Page 27

  • Download
  • Add to my manuals
  • Print
  • Page
    / 77
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 26
3. Software
ASUS 802.11g Access Point 27
Chapter 3 - Software Configuration
Access Point
WPA Encryption
When “WPA-PSK” authentication method is used, the newly proposed TKIP
(Temporal Key Integrity Protocol) or AES encryption schemes are applied.
WPA Pre-Shared Key
Selecting “TKIP” or “AES” in the WPA Encryption, this field is used as a
password to begin the encryption process. Note: 8 to 63 characters are
required.
WEP Encryption
Traditional WEP encryption is applied when “Open or Shared Key”, “Shared
Key” or “Radius with 802.1x” authentication methods are selected.
NOTE: When “WPA” or “WPA-PSK” authentication methods are se-
lected, you still can set WEP encryption for those clients that do
not support WPA/WPA-PSK. Please note that Key Index for WEP
key is limited to 2 or 3 when both WPA and WEP encryption are
supported at the same time.
64/128-bit versus 40/104-bit
The following section explains low-level (64-bit) and high-level (128-bit)
WEP Encryption schemes:
64-bit WEP Encryption
64-bit WEP and 40-bit WEP are the same encryption method and can
interoperate in a wireless network. This level of WEP encryption uses a
40-bit (10 Hex character) encryption scheme as a secret key, which is set
by the user, and a 24-bit “Initialization Vector” scheme, which is not under
user control.
Together these two schemes make a 64-bit (40 + 24) encryption scheme.
Some vendors refer to this level of WEP as 40-bit and others refer to this as
64-bit. ASUS WLAN products use the term 64-bit when referring to this
lower level of encryption.
128-bit WEP Encryption
104-bit WEP and 128-bit WEP are the same encryption method and can
interoperate on a wireless network. This level of WEP encryption uses a
104-bit (26 Hex character) encryption scheme as a secret key which is set
by the user, and a 24-bit “Initialization Vector”, which is not under user
control.
Page view 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 76 77

Comments to this Manuals

No comments